Sciweavers

2503 search results - page 173 / 501
» Building Computer Network Attacks
Sort
View
PERCOM
2007
ACM
16 years 1 months ago
SMOCK: A Self-Contained Public Key Management Scheme for Mission-Critical Wireless Ad Hoc Networks
Mobile ad hoc networks show great potential in emergency response and/or recovery. Such mission-critical applications demand security service be "anywhere", "anytim...
Wenbo He, Ying Huang, Klara Nahrstedt, Whay Chiou ...
122
Voted
WS
2004
ACM
15 years 7 months ago
JANUS: towards robust and malicious resilient routing in hybrid wireless networks
In this paper we investigate and provide solutions for security threats in the context of hybrid networks consisting of a cellular base station and mobile devices equipped with du...
Bogdan Carbunar, Ioannis Ioannidis, Cristina Nita-...
CIMCA
2005
IEEE
15 years 7 months ago
Hybrid Neural Networks for Immunoinformatics
Hybrid set of optimally trained feed-forward, Hopfield and Elman neural networks were used as computational tools and were applied to immunoinformatics. These neural networks ena...
Khrizel B. Solano, Tolja Djekovic, Mohamed Zohdy
MOBICOM
2000
ACM
15 years 6 months ago
Intrusion detection in wireless ad-hoc networks
As the recent denial-of-service attacks on several major Internet sites have shown us, no open computer network is immune from intrusions. The wireless ad-hoc network is particula...
Yongguang Zhang, Wenke Lee
111
Voted
IV
2009
IEEE
107views Visualization» more  IV 2009»
15 years 8 months ago
Multiscale Visual Analysis of Lexical Networks
A lexical network is a very useful resource for natural language processing systems. However, building high quality lexical networks is a complex task. “Jeux de mots” is a web...
Guillaume Artignan, Mountaz Hascoët, Mathieu ...